Patents Assigned to TECSEC
-
Patent number: 5787173Abstract: A system for the secure communication of a message from a transmitting user to a receiving user using a split key scheme. Each user generates a key component using a cryptographic engine. The key component is a pseudorandom sequence of bits with an appended error detection field which is mathematically calculated based on the pseudorandom sequence. This key component is then sent out on a communications channel from the transmitting user to the receiving user. The receiving user also sends its key component to the transmitting user. Each location performs a mathematical check on the key component received from the other location. If the key component checks pass at both locations, the transmit key component and the receive key component, including the error detection fields, are combined at both locations, forming identical complete keys at both locations.Type: GrantFiled: March 12, 1997Date of Patent: July 28, 1998Assignee: TECSEC IncorporatedInventors: Edward M. Seheidt, John J. Crowley
-
Patent number: 5717755Abstract: A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard object tracking mechanism is used that allows users to distribute multiple encrypted embedded objects to other individuals in a single encrypted object. By effecting compartmentalization of every object by label attributes and algorithm attributes, multi-level multimedia security is achieved.Type: GrantFiled: September 13, 1994Date of Patent: February 10, 1998Assignee: TECSEC,Inc.Inventor: M. Greg Shanton
-
Patent number: 5680452Abstract: A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard object tracking mechanism is used that allows users to distribute to other individuals multiple encrypted objects embedded in a single encrypted object. By effecting compartmentalization of every object by label attributes and algorithm attributes, multi-level multimedia security is achieved. Label attributes are used to restrict access to objects based on location, group, or other criteria and may specify personal access. Access type, such as read-only, write-only, and print-only may be specified. Nested embedded objects may be accessed directly through selection from a header array.Type: GrantFiled: February 24, 1995Date of Patent: October 21, 1997Assignee: TECSEC Inc.Inventor: M. Greg Shanton
-
Patent number: 5440290Abstract: A proximity detection device for protection of personnel against exposure to hazardous radio frequency radiation. The device works by detecting the presence of people, either the operator or bystanders, who are in the system antenna's radio frequency radiation hazard zone. Upon detection, the device triggers a timer that delays the activation of alarm circuitry for a brief period of time. This time delay is instituted to minimize the triggering of nuisance alarms by a momentary intrusion in the hazard zone. If a presence is still detected after the delay time, pulsing visual and audible alarms are triggered to alert the system operator of the dangerous situation. The alarms remain activated for a timed period, allowing the operator to clear the hazard zone.Type: GrantFiled: June 7, 1993Date of Patent: August 8, 1995Assignee: TECSEC IncorporatedInventors: Charles E. McCullough, Roy D. Follendore, III
-
Patent number: 5432851Abstract: An access control system which uses a password token scheme for controlling user access to data within computer systems. The key component in the access control system is an optical token card that is capable of receiving optically encoded information directly from the CRT display of a standard personal computer and processing the information for use in identification and authentication procedures, cryptographic key management schemes, and administrative procedures such as maintaining audit trails. This design permits the use of much longer strings of challenge input data without the addition of peripheral readers to the system.Type: GrantFiled: October 21, 1993Date of Patent: July 11, 1995Assignee: TECSEC IncorporatedInventors: Edward M. Scheidt, Charles E. McCullough, C. Jay Wack
-
Patent number: 5410599Abstract: A portable voice and data encryption device designed to be used with normal wideband telephone and cellular telephones, computers and facsimile machines to transmit voice and data in encrypted form. The V/DED comprises a voice and data encryption module, an encryption and control module, and a modem module. The modem module can adapt its data rate to account for the changes in the signal strength between the sending and receiving sites. The encryption and control module senses the change in data rate of the modem module during transmission and synchronizes the activities of the voice and data module so that the amount of data being produced for encryption and transmission matches the data rate being experienced by the modem module. The V/DED very simply connects to the wall jack of a normal PSTN with the computer, telephone, or facsimile machine plugging directly into the V/DED.Type: GrantFiled: May 14, 1993Date of Patent: April 25, 1995Assignee: TECSEC, IncorporatedInventors: John J. Crowley, Michael J. Wickham
-
Patent number: 5375169Abstract: A system for the secure communication of a message from a transmitting user to a receiving user using a split key scheme. Each user generates a key component using a cryptographic engine. The key component is a pseudorandom sequence of bits with an appended error detection field which is mathematically calculated based on the pseudorandom sequence. This key component is then sent out on a communications channel from the transmitting user to the receiving user. The receiving user also sends its key component to the transmitting user. Each location performs a mathematical check on the key component received from the other location. If the key component checks pass at both locations, the transmit key component and the receive key component, including the error detection fields, are combined at both locations, forming identical complete keys at both locations.Type: GrantFiled: May 28, 1993Date of Patent: December 20, 1994Assignee: TECSEC, IncorporatedInventors: Edward M. Seheidt, John J. Crowley
-
Patent number: 5369707Abstract: A method and apparatus for ensuring the security of messages communicated on a network. The system employs different levels of security to ensure that communication integrity is not breached. A user must first enter a valid password to clear the access control subsystem. The sending user must also possess valid cryptographic information and belong to a particular organization and/or be located at a particular device in order to encrypt a plain text message that is to be transmitted over the network. The device and organization information, along with receiving user information specified by the sending user, will then be grouped into a header which will be appended to the outgoing encrypted message. In order to receive a transmitted message, a receiving user must be the particular receiving user and be part of the particular group specified by the sending user, and must be attempting to receive the communication at the device specified in the message header.Type: GrantFiled: January 27, 1993Date of Patent: November 29, 1994Assignee: TECSEC IncorporatedInventor: Roy D. Follendore, III
-
Patent number: 5369702Abstract: A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard object tracking mechanism is used that allows users to distribute multiple encrypted embedded objects to other individuals in a single encrypted object. By effecting compartmentalization of every object by label attributes and algorithm attributes, multi-level multimedia security is achieved.Type: GrantFiled: October 18, 1993Date of Patent: November 29, 1994Assignee: TECSEC IncorporatedInventor: M. Greg Shanton